A timely reference that explores the topic more broadly than other books, thoroughly discussing wireless security issues from physical layer to application layer. With the introduction of third generation wireless networks, wireless LANs, Bluetooth, and sensor networks, wireless computing is expanding rapidly. However, security is a major concern for wide deployments of wireless networks. This book identifies important vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and offers ways to strengthen security and services throughout. …mehr
A timely reference that explores the topic more broadly than other books, thoroughly discussing wireless security issues from physical layer to application layer. With the introduction of third generation wireless networks, wireless LANs, Bluetooth, and sensor networks, wireless computing is expanding rapidly. However, security is a major concern for wide deployments of wireless networks. This book identifies important vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and offers ways to strengthen security and services throughout.
Artikelnr. des Verlages: 11409366, 978-0-387-28040-0
2007
Seitenzahl: 432
Erscheinungstermin: 5. Juni 2007
Englisch
Abmessung: 241mm x 160mm x 28mm
Gewicht: 827g
ISBN-13: 9780387280400
ISBN-10: 0387280405
Artikelnr.: 20891284
Herstellerkennzeichnung
Springer-Verlag GmbH
Tiergartenstr. 17
69121 Heidelberg
ProductSafety@springernature.com
Inhaltsangabe
Security in General Wireless/Mobile Networks.- High Performance Elliptic Curve Cryptographic Co-processor.- An Adaptive Encryption Protocol in Mobile Computing.- Security in Ad Hoc Network.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.- Secure Routing in Wireless Ad-Hoc Networks.- A Survey on Intrusion Detection in Mobile Ad Hoc Networks.- Security in Mobile Cellular Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Security in Wireless LANs.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless Lan roaming.- An Experimental Study on Security Protocols in Wlans.- Security in Sensor Networks.- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in AD HOC and Sensor Networks.
Security in General Wireless/Mobile Networks.- High Performance Elliptic Curve Cryptographic Co-processor.- An Adaptive Encryption Protocol in Mobile Computing.- Security in Ad Hoc Network.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.- Secure Routing in Wireless Ad-Hoc Networks.- A Survey on Intrusion Detection in Mobile Ad Hoc Networks.- Security in Mobile Cellular Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Security in Wireless LANs.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless Lan roaming.- An Experimental Study on Security Protocols in Wlans.- Security in Sensor Networks.- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in AD HOC and Sensor Networks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826